Published in: Dagstuhl Reports, Volume 3, Issue 11 (2014)
Felix C. Freiling, Gerrit Hornung, and Radim Polcák. Forensic Computing (Dagstuhl Seminar 13482). In Dagstuhl Reports, Volume 3, Issue 11, pp. 193-208, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2014)
@Article{freiling_et_al:DagRep.3.11.193, author = {Freiling, Felix C. and Hornung, Gerrit and Polc\'{a}k, Radim}, title = {{Forensic Computing (Dagstuhl Seminar 13482)}}, pages = {193--208}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2014}, volume = {3}, number = {11}, editor = {Freiling, Felix C. and Hornung, Gerrit and Polc\'{a}k, Radim}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.3.11.193}, URN = {urn:nbn:de:0030-drops-44426}, doi = {10.4230/DagRep.3.11.193}, annote = {Keywords: practical experience in forensics and law; applied forensic computing} }
Published in: Dagstuhl Reports, Volume 1, Issue 10 (2012)
Felix C. Freiling, Dirk Heckmann, Radim Polcák, and Joachim Posegga. Forensic Computing (Dagstuhl Seminar 11401). In Dagstuhl Reports, Volume 1, Issue 10, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{freiling_et_al:DagRep.1.10.1, author = {Freiling, Felix C. and Heckmann, Dirk and Polc\'{a}k, Radim and Posegga, Joachim}, title = {{Forensic Computing (Dagstuhl Seminar 11401)}}, pages = {1--13}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2012}, volume = {1}, number = {10}, editor = {Freiling, Felix C. and Heckmann, Dirk and Polc\'{a}k, Radim and Posegga, Joachim}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.1.10.1}, URN = {urn:nbn:de:0030-drops-33691}, doi = {10.4230/DagRep.1.10.1}, annote = {Keywords: forensic teaching; practical experience in forensics and law; selective imaging; mobile phone forensics; cryptographic hash functions} }
Published in: Dagstuhl Seminar Proceedings, Volume 6371, From Security to Dependability (2007)
Christian Cachin, Felix C. Freiling, and Jaap-Henk Hoepman. 06371 Abstracts Collection – From Security to Dependability. In From Security to Dependability. Dagstuhl Seminar Proceedings, Volume 6371, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{cachin_et_al:DagSemProc.06371.1, author = {Cachin, Christian and Freiling, Felix C. and Hoepman, Jaap-Henk}, title = {{06371 Abstracts Collection – From Security to Dependability}}, booktitle = {From Security to Dependability}, pages = {1--19}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6371}, editor = {Christian Cachin and Felix C. Freiling and Jaap-Henk Hoepman}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06371.1}, URN = {urn:nbn:de:0030-drops-8532}, doi = {10.4230/DagSemProc.06371.1}, annote = {Keywords: Fault-tolerance, safety, distributed computing, language-based security, cryptography} }
Published in: Dagstuhl Seminar Proceedings, Volume 6371, From Security to Dependability (2007)
Christian Cachin, Felix C. Freiling, and Jaap-Henk Hoepman. 06371 Executive Summary – From Security to Dependability. In From Security to Dependability. Dagstuhl Seminar Proceedings, Volume 6371, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{cachin_et_al:DagSemProc.06371.2, author = {Cachin, Christian and Freiling, Felix C. and Hoepman, Jaap-Henk}, title = {{06371 Executive Summary – From Security to Dependability}}, booktitle = {From Security to Dependability}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6371}, editor = {Christian Cachin and Felix C. Freiling and Jaap-Henk Hoepman}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06371.2}, URN = {urn:nbn:de:0030-drops-8512}, doi = {10.4230/DagSemProc.06371.2}, annote = {Keywords: Fault-tolerance, safety, distributed computing, language-based security, cryptography} }
Published in: Dagstuhl Seminar Proceedings, Volume 6371, From Security to Dependability (2007)
Peter Druschel, Andreas Haeberlen, and Petr Kouznetsov. Abstracting out Byzantine Behavior. In From Security to Dependability. Dagstuhl Seminar Proceedings, Volume 6371, pp. 1-12, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{druschel_et_al:DagSemProc.06371.3, author = {Druschel, Peter and Haeberlen, Andreas and Kouznetsov, Petr}, title = {{Abstracting out Byzantine Behavior}}, booktitle = {From Security to Dependability}, pages = {1--12}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6371}, editor = {Christian Cachin and Felix C. Freiling and Jaap-Henk Hoepman}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06371.3}, URN = {urn:nbn:de:0030-drops-8501}, doi = {10.4230/DagSemProc.06371.3}, annote = {Keywords: Fault-tolerance, Byzantine failures, masking, detection, total order broadcast, weak interactive consistency} }
Published in: Dagstuhl Seminar Proceedings, Volume 6371, From Security to Dependability (2007)
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, and Avital Yachin. Denial of Service Protection with Beaver. In From Security to Dependability. Dagstuhl Seminar Proceedings, Volume 6371, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{badishi_et_al:DagSemProc.06371.4, author = {Badishi, Gal and Keidar, Idit and Herzberg, Amir and Romanov, Oleg and Yachin, Avital}, title = {{Denial of Service Protection with Beaver}}, booktitle = {From Security to Dependability}, pages = {1--6}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6371}, editor = {Christian Cachin and Felix C. Freiling and Jaap-Henk Hoepman}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06371.4}, URN = {urn:nbn:de:0030-drops-8492}, doi = {10.4230/DagSemProc.06371.4}, annote = {Keywords: Denial of Service} }
Published in: Dagstuhl Seminar Proceedings, Volume 6371, From Security to Dependability (2007)
Michael Abd-El-Malek, Gregory R. Ganger, Garth R. Goodson, Michael K. Reiter, and Jay J. Wylie. Towards bounded wait-free PASIS. In From Security to Dependability. Dagstuhl Seminar Proceedings, Volume 6371, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2007)
@InProceedings{abdelmalek_et_al:DagSemProc.06371.5, author = {Abd-El-Malek, Michael and Ganger, Gregory R. and Goodson, Garth R. and Reiter, Michael K. and Wylie, Jay J.}, title = {{Towards bounded wait-free PASIS}}, booktitle = {From Security to Dependability}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2007}, volume = {6371}, editor = {Christian Cachin and Felix C. Freiling and Jaap-Henk Hoepman}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.06371.5}, URN = {urn:nbn:de:0030-drops-8488}, doi = {10.4230/DagSemProc.06371.5}, annote = {Keywords: Byzantine fault-tolerant, erasure-coded storage, bounded wait-free, non-skipping timestamps} }
Feedback for Dagstuhl Publishing